An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.ĭouble free in WebGL in Google Chrome prior to 1.115 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. The specific flaw exists within a fault handler. Depending on the function executed, the attack can read or modify any user or application data and can make the application unavailable.Ī flaw was found in the Linux kernel's udmabuf device driver. There are no known workarounds for this issue.Īn attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) - versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. This issue has been addressed in versions 5.0.9 and 5.1.3. In order to prevent this, it is at least recommendable to distribute the DNS queries through a pool of distinct sockets, each of them with a random source port and renew them periodically. Although unlikely in many setups, an external attacker could inject forged DNS responses into a Graylog's lookup table cache. In order to prevent cache poisoning with spoofed DNS responses, it is necessary to maximise the uncertainty in the choice of a source port for a DNS query. This goes against recommended practice since 2008, when Dan Kaminsky discovered how easy is to carry out DNS cache poisoning attacks. Graylog binds a single socket for outgoing DNS queries and while that socket is bound to a random port number it is never changed again. Graylog makes use of only one single source port for DNS queries. Graylog is a free and open log management platform.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |